US20060234764A1 - Electronic device, operational restriction control method thereof and operational restriction control program thereof - Google Patents
Electronic device, operational restriction control method thereof and operational restriction control program thereof Download PDFInfo
- Publication number
- US20060234764A1 US20060234764A1 US11/239,401 US23940105A US2006234764A1 US 20060234764 A1 US20060234764 A1 US 20060234764A1 US 23940105 A US23940105 A US 23940105A US 2006234764 A1 US2006234764 A1 US 2006234764A1
- Authority
- US
- United States
- Prior art keywords
- function
- operational restriction
- authentication information
- operating
- electronic device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims description 16
- 238000012545 processing Methods 0.000 claims description 28
- 230000006870 function Effects 0.000 abstract description 279
- 230000007423 decrease Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 18
- 230000007246 mechanism Effects 0.000 description 15
- 230000004913 activation Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 230000003213 activating effect Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 3
- 238000012217 deletion Methods 0.000 description 3
- 230000037430 deletion Effects 0.000 description 3
- 230000010365 information processing Effects 0.000 description 3
- 210000003462 vein Anatomy 0.000 description 3
- 230000015556 catabolic process Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000000593 degrading effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 208000008918 voyeurism Diseases 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
- H04M1/724631—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
- H04M1/724634—With partially locked states, e.g. when some telephonic functional locked states or applications remain accessible in the locked states
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
- H04M1/724631—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/34—Microprocessors
Definitions
- the present invention relates to operational restriction control of an electronic device such as mobile terminal devices with multiple functions including phone function, and more specifically, relates to an electronic device in which processing of multiple functions, security features, and operability are integrated harmoniously, and to a method and a program of operational restriction control.
- the present invention relates to an electronic device in which harmonious integration of concurrent operations of multiple functions, operability, and security features is realized.
- receiving and answering incoming calls are enabled while operational restriction has been set thereto; using address search function is enabled while having a phone talk; and even while an operational restriction (lock function) has been put on the address search function, the function and other functions will become available by releasing the operational restriction based on certain conditions, without terminating the ongoing phone talk once or losing the lock function.
- a mobile terminal device equipped with open/close lock function for imposing operational restriction in coordination with open/close mechanism of its case parts.
- open/close lock function aims at providing temporary operational restriction on multiple functions or on a selected function by the open/close mechanism to be activated simply by folding the case parts when a user leaves the mobile terminal unattended, with the intention of preventing information leakage through peeping of private information such as address book entries stored in the mobile terminal.
- basic operations such as incoming calls, phone talk, and display should not be restricted in light of usability, and even though after its operational restriction is released selectively, such an inconvenience as its security features are declined should not arise by suppressing (locking) operations of other functions.
- the present invention relates to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, and its object is to enable operation of another function on which operational restriction has been put even while a particular function is operated, without loss of its security features.
- Another object of the present invention is, in regard to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, to provide a capability to activate another function on which operational restriction has been put while maintaining a phone talk in the case where incoming calls are arrived and the calls are answered, and to improve usability of operations without loss of its security features.
- an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the electronic device comprising a control part that accepts said another function calling while operating said one function, and that releases operational restriction based on a judgment of authentication information in the case where the operational restriction has been set to said another function being called.
- Electronic devices include mobile phones and the like, which are capable of operating multiple functions simultaneously such as reference of phonebook while answering the phone, however, the present invention is not limited to such communication devices as such mobile phones, since an electronic game machine and the like capable of calling another game (another function) while playing one particular game (one function) is conceivable.
- the present invention can be applied to electronic devices having such multi-task function and operational restriction function.
- This electronic device accepts another function calling while operating one function. If operational restriction has been set to said another function being called, then it is impossible to activate said another function without removing the operational restriction.
- Such function calling triggers the prompt of authentication information input.
- This authentication information includes the authentication information having been registered in the electronic devices such as fingerprints, an identification number, or vein. Users provide such authentication information as required, and through reference of the authentication information, the operational restriction is either released or still imposed. That is, the operation of said another function that has received its function calling becomes possible while one function is operated.
- control part be configured to output display information prompting to enter the authentication information when it accepts a function calling. According to such a configuration, users can be informed by the output of display information.
- an operational restriction control method of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising the processing of accepting said another function calling while operating said one function; judging authentication information in the case where operational restriction has been set to said another function being called; and releasing the operational restriction based on the judgment of the authentication information.
- the processing of accepting said another function calling is performed while operating said one function.
- input for calling is accepted through the operation of a specific key and the like.
- authentication information is referenced, and based on the result of its reference, the processing to release the operational restriction is performed. Owing to a series of such processing, as long as the authentication information is incorrect, activation of the function is impossible, so security features would not be lost, and the function being called can be performed after having released the operational restriction that has been put on the function being called.
- an operational restriction control program of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the program to be executed by a computer, comprising the steps of accepting said another function calling while operating said one function; judging authentication information in the case where operational restriction has been set to said another function being called; and releasing the operational restriction based on the judgment of the authentication information.
- an authentication information input part for inputting authentication information may be further provided; the control part may be configured to judge whether or not the entered authentication information matches the registered authentication information; or an operation part used for the function calling may be further provided.
- the processing of outputting display information prompting for input of authentication information used as a reference for releasing the operational restriction may be further provided.
- the step of outputting display information prompting for input of authentication information used as a reference for releasing the operational restriction may be further provided.
- FIG. 1 is a block diagram showing a mobile terminal device according to a first embodiment
- FIG. 2 is a diagram showing a mobile terminal device in an opened state
- FIG. 3 is a diagram showing a mobile terminal device in a closed state
- FIG. 4 is a flowchart showing the operation of function calling during incoming calls while open/close lock has been set
- FIG. 5 is a flowchart showing the operation of function calling during incoming calls while open/close lock has been set
- FIGS. 6A, 6B , 6 C, and 6 D are diagrams showing incoming call screen, phone talk screen, and authentication screen and the like.
- FIG. 7A is a diagram showing open/close lock release screen, and 7 B is-a diagram showing menu screen;
- FIG. 8 is a flowchart showing the operation of function calling while open/close clock has-been set
- FIG. 9 is a flowchart showing the operation of another function calling while one function is operated.
- FIG. 10 is a block diagram showing a mobile terminal device according to a second embodiment
- FIG. 11 is a diagram showing a mobile terminal device
- FIG. 12 is a diagram showing a mobile terminal device without a fingerprint sensor
- FIG. 13 is a diagram showing a PC
- FIG. 14 is a diagram showing a PDA
- FIG. 15 is a diagram showing a camera
- FIG. 1 is a block diagram showing a mobile terminal device according to a first embodiment.
- This mobile terminal device 2 is one example of electronic devices that comprise a plurality of functions including phone call function, and the mobile terminal device 2 of this embodiment includes open/close lock function interlocked with an open/close mechanism to be described later ( FIG. 2 ).
- the open/close lock function is a function for putting operational restriction on all or some of the functions that the mobile terminal device 2 provides; and for establishing a locked-up state automatically by synchronizing the timing to put the operational restriction with the open/close mechanism. That is, a locked-up state is established by changing the device from an opened state to a closed state.
- This mobile terminal device 2 includes a memory part 4 , a processor 6 , a wireless transmission/reception part 8 , an open/close sensor 10 , an input operation part 12 , a fingerprint sensor 14 , a display part 16 , a microphone 18 , a speaker 20 and others.
- the memory part 4 represents record medium such as a ROM (Read-Only Memory), a RAM (Random-Access Memory) as a whole, and may be comprised of removable record medium.
- a program storage part 42 In this memory part 4 , a program storage part 42 , a data storage part 44 , and others are defined; and in this program storage part 42 , a management program 422 , a screen display program 424 , an authentication program 426 , a lock/release program 428 , and other various types of information processing programs are stored.
- the management program 422 constitutes a framework and manages storage and deletion of data such as address book, phonebook, notepad; execution and stop of the screen display program 424 , the authentication program 426 , the lock set/release program 428 , and other various types of information processing programs.
- the lock set/release program 428 executes lock setting (operational restriction) and its release (release of restriction) to each function. In this case, for the operational restriction, various types of modes such as all-lock mode, secret mode, and falsification-proof mode are provided in order to meet the demand for security features.
- All-lock mode puts operational restriction on all the functions; secret mode puts operational restriction on display function of phonebook data and schedule data; and falsification-proof mode puts operational restriction on display and edit functions of data such as phonebook, profile, and schedule.
- This mobile terminal device 2 is configured such that even if operational restrictions have been put on any of the functions, incoming call function and phone talk function are free from such operational restrictions. Further, in order to release operational restrictions that have been put on the functions, authentication information is referenced and for this authentication information, previously registered information by users such as fingerprints, a PIN number, and vein information are used.
- an address book area 442 In the data storage part 44 , an address book area 442 , a phonebook area 444 , a notepad area 446 , and authentication information area 448 , and others are defined and relevant data is stored respectively. That is, address data such as contacts is stored in the address book area 442 ; phone numbers for making a call and email addresses for sending/receiving emails are stored in the phonebook area 444 ; memos written by users as needed are stored in the notepad area 446 , and these information belong to private information of users.
- the authentication information area 448 various types of authentication information such as fingerprints, a PIN number, vein information and the like are registered.
- the processor 6 constitutes the control part, the operational restriction setting judgment part, the authentication information request part, the information processing part and the like.
- the processor 6 is comprised of a CPU (Central Processing Unit) or the like, and provided with the memory part for storing data in the process of computing.
- This processor 6 executes various types of programs such as the above-described management program 422 , and performs various settings and controls such as phone call function, open/close lock function, its release function, operational restriction setting judgment function, authentication information request function, screen display function, input/output of various data function, address book or phonebook searching function, notepad writing function, or its delete function.
- the control part provides functions to accept another function calling while operating one function and to release operational restriction based on the judgment of authentication information in the case where the operational restriction has been set to the function being called. More specifically, the control part provides such a function that accepts incoming calls in the case where operational restriction has been set; accepts another function calling during a phone talk; and releases the operational restriction based on authentication information, in the case where the operational restriction has been set to the function being called.
- the function as the operational restriction setting judgment part the processor 6 possesses is a function to judge whether or not operational restriction has been set to another function being called in the case where said another function is called while operating one function.
- the function as the authentication information request part is a function to make a request to the user for authentication information for releasing the operational restriction in the case where the operational restriction setting judgment part judges that the operational restriction has been set to said another function.
- the function as the control part that is linked with these functions is a function to make a judgment by comparing the authentication information requested from the authentication information request part with the authentication information entered by the user, and that releases the operational restriction based on the judgment result.
- the wireless transmission/reception part 8 performs transmission/reception over wireless signals to and from base stations (not shown) via an antenna 22 .
- This wireless transmission/reception part 8 includes a modem circuit for performing modulation/demodulation as signal processing, and a baseband circuit for performing encryption/decryption and the like.
- the open/close sensor 10 is disposed when the open/close mechanism 24 is provided for the mobile terminal device 2 , and detects electrically that the open/close mechanism 24 is brought into an opened state or a closed state.
- the input operation part 12 is used for entering phone numbers, characters, and PIN numbers as a personal identification number; for activating a function; and for operating its release and the like.
- the input operation part 12 includes a task key 122 , a decision key 124 , dial and character keys 126 , a start and character key 128 , a power/end key 129 , and others.
- the input operation part 12 constitutes the authentication information input part.
- the task key 122 comprises an operation part used for function calling, and used for entering instructions such as activation of functions.
- the decision key 124 is used for entering a confirmation of instructions for the information or the function displayed on the display part 16 when the function is activated.
- Dial and character keys 126 are used for dial input, character input, PIN number input as authentication information and others.
- the start and character key 128 is used for starting a phone call.
- the power/end key 129 is used for turning the power on and terminating phone calls.
- the fingerprint sensor 14 comprises the authentication information input part, and in this embodiment, detects the fingerprints of users that are one of the authentication information.
- the fingerprint sensor 14 may be skipped when fingerprints are not used as authentication information.
- the display part 16 consists of an LCD (Liquid Crystal Display), for example, and displays images such as characters, graphics, and pictures; status indication while one function is operated; and in the case where another function calling is performed while one function is operated, displays information about the function calling or its status indication in progress.
- LCD Liquid Crystal Display
- the microphone 18 converts voice input into electrical signals
- the speaker 20 converts the electrical signals into voice.
- the microphone 18 and the speaker 20 are used in both outgoing call mode and incoming call mode; however, in all-lock mode, operational restriction is set thereto.
- the mobile terminal device 2 configured as such can operate multiple functions simultaneously as well as put operational restriction selectively on each function depending on its security features. Further, it can accept another function calling while operating one function; accept input of authentication information if operational restriction has been set to said another function; compare the entered authentication information with the registered authentication information; and operate said another function while operating said one function if the entered authentication information is correct. For example, if a situation arises in which phonebook needs to be referenced during incoming calls in the case where operational restriction has been set to the phonebook and receiving incoming calls has been made possible, pressing the task key 122 switches to authentication mode and reference-of the phonebook is allowed if the authentication information is found as identical. In this way, another function can be operated while one function is operated based on the condition that the authentication information is identical, and this can save the operation to switch to another function after having terminated one function, maintain security features, and consequently provide the mobile terminal device 2 of higher convenience.
- FIG. 2 is a front view of the mobile terminal device 2 in an opened state
- FIG. 3 is a side view in a closed state.
- the same symbols are assigned to parts identical to those of FIG. 1 .
- This mobile terminal device 2 includes a first and a second case part 26 , 28 respectively, and these case parts 26 , 28 are connected to be openable/closable via the open/close mechanism 24 .
- the open/close sensor 10 is disposed on the case parts 26 , 28 that are opened by the open/close mechanism 24 , and a detection signal for representing an opened or closed state of the case parts 26 , 28 is obtained from this open/close sensor 10 .
- a locked-up state operational restriction state
- various keys 122 to 129 of the input operation part 12 , the fingerprint sensor 14 , the microphone 18 and others are disposed along with the built-in memory part 4 , the processor 6 and others.
- the display part 16 and the speaker 20 are disposed along with the built-in antenna 22 .
- the above-described operations such as calling another function during a phone talk, authentication operation of its authentication information, and operation of said another function can be performed without any alterations to the key arrangement of the existing input operation part 12 .
- FIG. 4 is a flowchart showing the operation of incoming calls and function calling while the open/close lock has been set. This processing is performed when the case parts 26 , 28 are folded.
- this terminal device 2 the operation of incoming calls and phone talk is possible even if operational restriction has been set to its various types of functions. This is a situation in which the power has been turned on; an incoming call is received while operational restriction has been set; and a ring alert occurs (step Si) while the case parts 26 , 28 have been folded ( FIG. 3 ).
- a standby screen is activated and displayed on the display part 16 (step S 2 ).
- the user starts a phone talk (step S 3 ), and a screen showing that the phone talk is in progress is displayed (step S 4 ). That is, the user can recognize that the phone talk is still in progress.
- step S 5 pressing the task key 122 (step S 5 ) as a specific key of the input operation part 12 starts another function calling other than the phone talk function.
- this authentication processing it is judged whether or not the entered authentication information is identical to the previously registered authentication information by using the previously registered authentication information as a reference. If identical, then the authentication completes; the operational restriction is released; the function is activated (step S 10 ); and the screen showing its operation is displayed (step S 11 ). If the operational restriction has not been set, the procedure moves from step S 6 to step S 10 .
- step S 12 The user can operate this function during phone talk, and when the user finishes operating this function (step S 12 ), a judgment is made whether or not the phone talk is over (step S 13 ). If the phone talk is still taking place, then the procedure moves to step S 4 to display the screen showing that the phone talk is in progress; and then returns to the standby screen of step S 2 when the phone talk is over.
- the user can receive incoming calls with the mobile terminal device 2 in an opened state ( FIG. 3 ) and, for example, can refer to the phonebook during the phone talk.
- the locked state can be recovered by returning the mobile terminal device 2 to a closed state ( FIG. 3 ) from an opened state ( FIG. 2 ).
- FIG. 5 is a flowchart showing the operation of incoming calls and function calling while the open/close lock has been set.
- step S 21 the standby screen is displayed on the display part 16 .
- step S 22 the user starts a phone talk (step S 23 ); and a screen showing that the phone talk is in progress is displayed (step S 24 ). It has been already described that the user can recognize that the phone talk function is still in progress.
- step S 25 pressing the task key 122 (step S 25 ) as a specific key of the input operation part 12 starts another function calling other than the phone talk function as described above.
- step S 30 the operational restriction is released; the function is activated (step S 30 ) and the screen showing its operation is displayed (step S 31 ) If the operational restriction has not been set, the procedure moves from step S 26 to step S 30 .
- step S 32 The user can operate this function during phone talk, and when the user finishes operating this function (step S 32 ), a judgment is made whether or not the phone talk is over (step S 33 ). If the phone talk is still taking place, then the procedure moves to step S 24 to wait for the specific key to be pressed; and returns to the standby screen of step S 21 when the phone talk is over.
- This processing is performed when the user receives an incoming call with the standby screen activated ( FIG. 2 ), and can activate another function by releasing its operational restriction during the phone talk.
- the locked-up state can be recovered by returning the mobile terminal device 2 to a closed state ( FIG. 3 ).
- FIGS. 6A, 6B , 6 C, 6 D, 7 A, and 7 B are diagrams showing screens of an incoming call while the open/close lock has been set, another function calling, and authentication information input and the like
- FIG. 7A is a diagram showing a screen that the open/close lock is released
- 7 B is a diagram showing a menu screen after the open/close lock has been released.
- a screen 50 for indicating the incoming call is displayed on the display part 16 as shown in FIG. 6A .
- a screen 54 for indicating that the phone talk is in progress is displayed on the display part 16 as shown in FIG. 6B .
- a message “phone talk is in progress” and the phone number of the caller are displayed.
- This screen 54 may also display the name of the caller and other information.
- pressing the task key 122 ( FIG. 2 ) shown in FIG. 6C brings up an input screen 56 for entering authentication information as shown in FIG. 6D .
- a text indicating that “fingerprint authentication” is selected; and an image 58 for instructing how to use the fingerprint authentication method as well as a message “Enter your fingerprint or PIN number” is displayed as a guide message 60 for prompting input of authentication information.
- a screen 62 for indicating a release of the open/close lock is displayed on the display part 16 as shown in FIG. 7A .
- “Open/close lock has been released” is displayed as a message 64 for indicating the current state.
- a menu selection screen 66 for indicating a menu of functions from which the operational restriction has been released is displayed on the display part 16 as shown in FIG. 7B .
- various types of functions different from the phone talk function are displayed as selectable menu. For example, such functions as “Multi-access, Mail, Phonebook, List of applications...” are displayed. “Multi-access” indicates that activation and operation of another function that is selected is available while operating one function, for example, while operating the phone talk function. In this situation, for example, putting a cursor 68 on the “phonebook” and pressing the decision key 124 unfolds the phonebook data on the display part 16 .
- the user can reference the phonebook during the phone talk. If the user selects a different function, then that function is operated.
- the screen 54 indicating that the phone talk is in progress is displayed as shown in FIG. 6B , and the standby screen is brought back when the user finishes the phone talk.
- FIG. 8 is a flowchart showing the operation of function calling while the open/close lock has been set.
- step S 41 When the case parts 26 , 28 are opened, the standby screen is displayed on the display part 16 (step S 41 ). On this standby screen, the lock icon 52 for indicating the open/close lock has been set is displayed if the lock is applied. In this standby state, when the user operates function calling, the function calling is accepted (step S 42 ), followed by a judgment that the open/close lock has been set or not (step S 43 ).
- step S 44 the authentication screen is displayed on the display part 16 (step S 44 ); and the user is prompted with input of authentication information.
- step S 45 a judgment is made whether or not the entered authentication information is correct. If the entered authentication information is identical to the previously registered authentication information, then the open/close lock is released and the selected function is activated (step S 47 ); and the screen showing its operation is displayed (step S 48 ). If the operational restriction has not been set, the procedure moves from step S 43 to step S 47 . If the authentication information is judged as incorrect in step S 46 , then the standby screen in step S 41 is brought back. After the authentication processing has completed successfully and the function has been activated, a judgment is made whether or not the function is finished (step S 49 ), and the standby screen is brought back after the completion of the function (step S 41 ).
- a certain function can be called from the standby screen, and when the lock has been set to the function, the function can be activated and operated through its authentication processing.
- the mobile terminal device 2 can be put into a locked-up state by folding it to a closed state ( FIG. 3 ).
- FIG. 9 is a flowchart showing the operation of another function calling while one function is operated.
- Steps S 51 to S 58 show the operation of one function
- steps S 60 to S 66 show the operation of another function while operating said one function.
- operational restriction may have been set to any of the functions in steps S 60 to S 66 . This is a situation in which the operation of another function calling is accepted while operating one function and in which operational restriction is released from said another function in the case if any operational restrictions have been put thereon.
- the standby screen is displayed on the display part 16 of the mobile terminal device 2 in a standby state (step S 51 ).
- a standby state With this state, when the user executes one function calling (step S 52 ), then a judgment is made whether it has been locked or not (step S 53 ); if it has been locked, then the authentication screen is displayed on the display part 16 (step S 54 ); and the user is prompted with input of authentication information.
- step S 51 If the authentication information is judged as incorrect in step S 56 , then the standby screen in step S 51 is brought back.
- the management program 422 monitors whether or not the ongoing function is finished (step S 59 ), and brings back the standby screen at the end of the function (step S 51 ).
- step S 60 if another function calling occurs while operating one function (step S 60 ), then a judgment is made whether or not the function has been locked (step S 61 ). If the function has been locked, then authentication screen is displayed on the display part 16 (step S 62 ); and the user is prompted with input of authentication information. When the user enters the authentication information by following the guide (step S 63 ); then a judgment is made whether or not the entered authentication information is correct (step S 64 ). If the entered authentication information is identical to the previously registered authentication information, then the lock is released and said another function is activated (step S 65 ); and the screen showing its operation is displayed (step S 66 ). If said another function has not been locked in step S 61 , the procedure shifts from step S 61 to step S 65 to activate said another function.
- step S 64 If the authentication information is judged as incorrect in step S 64 , then the screen showing the operation of the ongoing function in step 58 is displayed.
- the management program 422 monitors whether or not said another function is finished (step S 67 ), and shifts to the screen showing the ongoing operation at the end of said another function (step S 58 ), making it ready for calling other functions.
- another function can be called while the operation of one function continues, and if the lock function has been applied to said another function being called, that is, if operational restriction has been put thereon, then said another function can be activated and operated through input of its authentication information and judgment of its correctness. Since the activation of this latter function is realized by an interrupt-service in the middle of processing the former function, so when the latter function finishes, the procedure returns to the previous function to continue its operation. Furthermore in this embodiment, by putting the mobile terminal device 2 back into a closed state ( FIG. 3 ), the lock function can be applied again.
- the electronic devices such as the mobile terminal device 2 comprising such features can operate multiple functions simultaneously with no decline in security features and operability.
- FIG. 10 is a block diagram of a mobile terminal device 2 according to a second embodiment.
- FIG. 11 is a diagram showing a specific configuration example of the mobile terminal device.
- the same symbols are assigned to parts identical to those of FIGS. 1, 2 .
- the mobile terminal device 2 of this embodiment includes a lock key 123 in place of the open/close sensor 10 ( FIG. 1 ). According to this configuration, pressing the lock key 123 activates the lock function and puts operational restriction. That is, this lock key 123 executes the activation of the lock function in the lock set/release program 428 stored in the program storage part 42 .
- Other configurations are the same as those of the mobile terminal device 2 of the first embodiment.
- Such a mobile terminal device 2 is not equipped with the open/close mechanism 24 ( FIG. 1 ), and comprised of a single case part 27 .
- the lock key 123 is disposed on this case part 27 .
- the input operation part 12 and the display part 16 and others that are disposed separately on the case parts 26 , 28 are arranged on the single case part 27 .
- Each configuration is the same as those of the mobile terminal device 2 of the first embodiment ( FIG. 2 ).
- FIGS. 4, 5 screen displays shown in FIGS. 6A to 7 B, and operations shown in FIGS. 8, 9 can be performed. That is, while operational restriction has been set by operating the lock key 123 , the processing such as accepting incoming calls and activating one function; calling another function during the incoming calls or while operating said one function; and activating and operating said another function through its authentication processing is enabled, so that there is an advantage that complicated key operations are not required.
- the mobile terminal device 2 comprising the fingerprint sensor 14 ( FIGS. 1, 2 ) was exemplified.
- the mobile terminal device 2 can be configured without the fingerprint sensor 14 , by enabling the release of operational restriction through a secret number such as a PIN number.
- the mobile terminal device 2 was exemplified as an electronic device; however, as shown in FIG. 13 , the present invention can also be applied to a PC (personal computer) 70 .
- a PC personal computer
- FIGS. 13 the same symbols are assigned to parts identical to those of FIGS. 1, 2 .
- This PC 70 is constructed such that the case part 26 and the case part 28 are disposed to be openable/closeable via the open/close mechanism 24 , and on the case part 26 , the above-described open/close sensor 10 is disposed. That is, it is also possible to configure the PC 70 to activate its lock mechanism by detecting an open/close state.
- disposing the task key 122 as a specific key provides, as described above, the capability of calling another function on which operational restriction has been put while one function is operated; enables to activate and then operate said another function after its authentication processing is completed; and can enhance security features for the PC 70 as well.
- the present invention can also be applied to a PDA (Personal Digital Assistant) 72 shown in FIG. 14 .
- the PDA can be configured to include the lock function along with the lock key 123 .
- Such a configuration provides, as described above, the capability of calling another function on which operational restriction has been put while one function is operated; enables to activate and then operate said another function after its authentication processing is completed; and can enhance security features for the PDA 72 as well.
- the present invention can also be applied to a camera 74 shown in FIG. 15 .
- the camera can be configured to include the lock function along with the lock key 123 .
- Such a configuration provides, as described above, the capability of calling another function, for example, edit function on which operational restriction has been put that becomes effective while one function such as photo shooting mode is operated; enables to activate and then operate the edit function after its authentication processing is completed.
- the camera 74 can be also provided with enhanced security features against deletion or falsification of its photographed data.
- the present invention can be applied to such as a game machine as well. For example, by enabling the game machine to call another game function on which operational restriction has been put while one game function is operated; and to activate and then operate said another game function after its authentication processing is completed, the game machine can be provided with enhanced security features against deletion or falsification of information set to the game.
- the mobile terminal device 2 the PC 70 , the PDA 72 , the camera 74 , and the game machine were exemplified as electronic devices.
- the present invention can also be applied to various types of electronic devices capable of operating multiple functions simultaneously and capable of setting operational restriction for the functions, other than the above-described ones.
- the mobile terminal device 2 that has been locked by the open/close lock mechanism could start a phone talk when it receives incoming calls, and could operate another function such as address book reference during a phone talk.
- the mobile terminal device 2 that is playing a game can start a phone talk immediately after it receives incoming calls, or can start a phone talk after it requests authentication information followed by a verification of correctness of the provided authentication information.
- the open/close lock function that was interlocked with the open/close mechanism 24 (first embodiment), and the lock function activated by operating the lock key 123 (second embodiment) were exemplified.
- the electronic devices such as the mobile terminal device 2 operateing multiple functions simultaneously, it is also possible to configure the devices in such a way that the lock function can be activated not only by the open/close mechanism 24 and the lock key 123 , but also by detecting the absence of operations by the user for a certain time period.
- the present invention relates to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, and is useful such that it enables to operate another function through authentication information matching; to realize simultaneous operation of multiple functions without degrading usability and security; and to increase level of convenience for electronic devices.
Abstract
The present invention relates to an electronic device capable of operating multiple functions simultaneously, and enables to operate another function on which operational restriction has been put, with no decline in security features, even while operating a particular function. The electronic device is an electronic device (e.g., mobile terminal device 2) capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising a control part (processor 6) that accepts said another function calling while operating said one function, and that releases the operational restriction based on the judgment of the authentication information in the case where the operational restriction has been set to said another function being called.
Description
- This application is based upon and claims the benefit of priority from the prior Japanese Patent Application No. 2005-119890, filed on Apr. 18, 2005, the entire contents of which are incorporated herein by reference.
- 1. Field of the Invention
- The present invention relates to operational restriction control of an electronic device such as mobile terminal devices with multiple functions including phone function, and more specifically, relates to an electronic device in which processing of multiple functions, security features, and operability are integrated harmoniously, and to a method and a program of operational restriction control.
- The present invention relates to an electronic device in which harmonious integration of concurrent operations of multiple functions, operability, and security features is realized. For example, in a mobile terminal device as one example of such electronic devices, receiving and answering incoming calls are enabled while operational restriction has been set thereto; using address search function is enabled while having a phone talk; and even while an operational restriction (lock function) has been put on the address search function, the function and other functions will become available by releasing the operational restriction based on certain conditions, without terminating the ongoing phone talk once or losing the lock function.
- 2. Description of the Related Art
- As an example of electronic devices, there is a mobile terminal device equipped with open/close lock function for imposing operational restriction in coordination with open/close mechanism of its case parts. Such open/close lock function aims at providing temporary operational restriction on multiple functions or on a selected function by the open/close mechanism to be activated simply by folding the case parts when a user leaves the mobile terminal unattended, with the intention of preventing information leakage through peeping of private information such as address book entries stored in the mobile terminal. As it is such a casual lock function that basic operations such as incoming calls, phone talk, and display should not be restricted in light of usability, and even though after its operational restriction is released selectively, such an inconvenience as its security features are declined should not arise by suppressing (locking) operations of other functions.
- Among conventional technologies related to such selective release of operational restriction on mobile phones and the like, there is one that switches to a phone talk state by the operation of a specific key when incoming calls are received in a standby state (e.g., Japanese Patent Application Laid-Open Publication No. H09(1997)-261336 (Paragraph No. 0048, FIG. 5, etc.) ) ; one that selects setting information according to the contents of incoming calls and messages received during key lock (e.g., Japanese Patent Application Laid-Open Publication No. 2004-328573 (Paragraph Nos. 0021, 0022, FIG. 2, etc.)).
- Owing to such partial release of operational restriction, users can handle incoming calls without releasing the open/close lock. However, if the users cannot release the lock during incoming calls or a phone talk, they find it impossible to operate another function such as reference of address book during incoming calls. If such a need arises, then a troublesome operation such as the following is required.
-
- 1. Terminate the phone call (finish the talk).
- 2. Release the lock.
- 3. Call back.
This is significantly inconvenient, and because of such inconvenience, lock mechanisms are hard to be utilized, leaving room for further improvement.
- The technologies disclosed in Japanese Patent Application Laid-Open Publication Nos. H09(1997)-261336 and 2004-328573 describe that answering the phone is possible even with the locked key, however, multiple key operations are required in order to switch to a phone talk state while receiving incoming calls, so there is a problem that key operations become cumbersome.
- Such issues are also common to an electronic device comprising multiple functions, capable of operating another function while operating one function and capable of setting operational restriction to said another function. None of Japanese Patent Application Laid-Open Publication Nos. H09 (1997)-261336, 2004-328573 discloses such issues at all, nor discloses or suggests any solutions for the issues.
- The present invention relates to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, and its object is to enable operation of another function on which operational restriction has been put even while a particular function is operated, without loss of its security features.
- Another object of the present invention is, in regard to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, to provide a capability to activate another function on which operational restriction has been put while maintaining a phone talk in the case where incoming calls are arrived and the calls are answered, and to improve usability of operations without loss of its security features.
- Each aspect of the configurations of the present invention in which the above-described issues have been solved will be listed and explained hereinafter.
- According to a first aspect of the present invention there is provided an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the electronic device comprising a control part that accepts said another function calling while operating said one function, and that releases operational restriction based on a judgment of authentication information in the case where the operational restriction has been set to said another function being called.
- Electronic devices according to the present invention include mobile phones and the like, which are capable of operating multiple functions simultaneously such as reference of phonebook while answering the phone, however, the present invention is not limited to such communication devices as such mobile phones, since an electronic game machine and the like capable of calling another game (another function) while playing one particular game (one function) is conceivable. The present invention can be applied to electronic devices having such multi-task function and operational restriction function.
- This electronic device accepts another function calling while operating one function. If operational restriction has been set to said another function being called, then it is impossible to activate said another function without removing the operational restriction. Such function calling triggers the prompt of authentication information input. This authentication information includes the authentication information having been registered in the electronic devices such as fingerprints, an identification number, or vein. Users provide such authentication information as required, and through reference of the authentication information, the operational restriction is either released or still imposed. That is, the operation of said another function that has received its function calling becomes possible while one function is operated. Since activation of said another function is impossible as long as the authentication information is incorrect, security features would not be lost; and there is no need to terminate said one ongoing function once in order to operate said another function being called and to activate said one function again at the end of operating said another function being called.
- It is preferable that, in the above-described electronic device, the control part be configured to output display information prompting to enter the authentication information when it accepts a function calling. According to such a configuration, users can be informed by the output of display information.
- According to a second aspect of the present invention there is provided an operational restriction control method of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising the processing of accepting said another function calling while operating said one function; judging authentication information in the case where operational restriction has been set to said another function being called; and releasing the operational restriction based on the judgment of the authentication information.
- According to this configuration, in order to operate another function while operating one function, the processing of accepting said another function calling is performed while operating said one function. In this processing, input for calling is accepted through the operation of a specific key and the like. At the time of accepting this function calling, if operational restriction has been set to said another function being called, then authentication information is referenced, and based on the result of its reference, the processing to release the operational restriction is performed. Owing to a series of such processing, as long as the authentication information is incorrect, activation of the function is impossible, so security features would not be lost, and the function being called can be performed after having released the operational restriction that has been put on the function being called.
- According to a third aspect of the present invention there is provided an operational restriction control program of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the program to be executed by a computer, comprising the steps of accepting said another function calling while operating said one function; judging authentication information in the case where operational restriction has been set to said another function being called; and releasing the operational restriction based on the judgment of the authentication information.
- According to this configuration, through the linked steps of accepting another function calling while operating one function and of releasing operational restriction by referencing its authentication information in the case where the operational restriction has been set to said another function being called, activation of said another function is made possible only when the authentication information is correct, so that security features would not be lost and said another function being called can be executed by the computer without the need for terminating the ongoing function once.
- To solve the above-described issues, in the previously described electronic device, an authentication information input part for inputting authentication information may be further provided; the control part may be configured to judge whether or not the entered authentication information matches the registered authentication information; or an operation part used for the function calling may be further provided.
- To solve the above-described issues, in the operational restriction control method of the previously described electronic device, the processing of outputting display information prompting for input of authentication information used as a reference for releasing the operational restriction may be further provided.
- To solve the above-described issues, in the previously described operational restriction control program of the electronic device, the step of outputting display information prompting for input of authentication information used as a reference for releasing the operational restriction may be further provided.
- Features and advantages of the present invention will be listed hereinbelow.
- (1) It makes possible for an electronic device capable of operating multiple functions simultaneously and capable of putting operational restriction on its functions to call and execute another function easily on which operational restriction has been put while one function is operated, without degradation of security features.
- (2) It makes possible for an electronic device such as mobile terminal devices capable of receiving incoming calls and having a phone talk to call and execute another function on which operational restriction has been put while having a phone talk, without degradation of security features and without inconvenience of terminating the phone talk.
- The above and other objects, features and advantages of the present invention will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings.
-
FIG. 1 is a block diagram showing a mobile terminal device according to a first embodiment; -
FIG. 2 is a diagram showing a mobile terminal device in an opened state; -
FIG. 3 is a diagram showing a mobile terminal device in a closed state; -
FIG. 4 is a flowchart showing the operation of function calling during incoming calls while open/close lock has been set; -
FIG. 5 is a flowchart showing the operation of function calling during incoming calls while open/close lock has been set; -
FIGS. 6A, 6B , 6C, and 6D are diagrams showing incoming call screen, phone talk screen, and authentication screen and the like. -
FIG. 7A is a diagram showing open/close lock release screen, and 7B is-a diagram showing menu screen; -
FIG. 8 is a flowchart showing the operation of function calling while open/close clock has-been set; -
FIG. 9 is a flowchart showing the operation of another function calling while one function is operated; -
FIG. 10 is a block diagram showing a mobile terminal device according to a second embodiment; -
FIG. 11 is a diagram showing a mobile terminal device; -
FIG. 12 is a diagram showing a mobile terminal device without a fingerprint sensor; -
FIG. 13 is a diagram showing a PC; -
FIG. 14 is a diagram showing a PDA; -
FIG. 15 is a diagram showing a camera; - A first embodiment of the present invention will be described with reference to
FIG. 1 .FIG. 1 is a block diagram showing a mobile terminal device according to a first embodiment. - This mobile
terminal device 2 is one example of electronic devices that comprise a plurality of functions including phone call function, and the mobileterminal device 2 of this embodiment includes open/close lock function interlocked with an open/close mechanism to be described later (FIG. 2 ). The open/close lock function is a function for putting operational restriction on all or some of the functions that the mobileterminal device 2 provides; and for establishing a locked-up state automatically by synchronizing the timing to put the operational restriction with the open/close mechanism. That is, a locked-up state is established by changing the device from an opened state to a closed state. - This mobile
terminal device 2 includes amemory part 4, aprocessor 6, a wireless transmission/reception part 8, an open/close sensor 10, aninput operation part 12, afingerprint sensor 14, adisplay part 16, amicrophone 18, aspeaker 20 and others. Thememory part 4 represents record medium such as a ROM (Read-Only Memory), a RAM (Random-Access Memory) as a whole, and may be comprised of removable record medium. In thismemory part 4, aprogram storage part 42, adata storage part 44, and others are defined; and in thisprogram storage part 42, amanagement program 422, ascreen display program 424, anauthentication program 426, a lock/release program 428, and other various types of information processing programs are stored. - The
management program 422 constitutes a framework and manages storage and deletion of data such as address book, phonebook, notepad; execution and stop of thescreen display program 424, theauthentication program 426, the lock set/release program 428, and other various types of information processing programs. The lock set/release program 428 executes lock setting (operational restriction) and its release (release of restriction) to each function. In this case, for the operational restriction, various types of modes such as all-lock mode, secret mode, and falsification-proof mode are provided in order to meet the demand for security features. All-lock mode puts operational restriction on all the functions; secret mode puts operational restriction on display function of phonebook data and schedule data; and falsification-proof mode puts operational restriction on display and edit functions of data such as phonebook, profile, and schedule. This mobileterminal device 2 is configured such that even if operational restrictions have been put on any of the functions, incoming call function and phone talk function are free from such operational restrictions. Further, in order to release operational restrictions that have been put on the functions, authentication information is referenced and for this authentication information, previously registered information by users such as fingerprints, a PIN number, and vein information are used. - In the
data storage part 44, anaddress book area 442, aphonebook area 444, anotepad area 446, andauthentication information area 448, and others are defined and relevant data is stored respectively. That is, address data such as contacts is stored in theaddress book area 442; phone numbers for making a call and email addresses for sending/receiving emails are stored in thephonebook area 444; memos written by users as needed are stored in thenotepad area 446, and these information belong to private information of users. In theauthentication information area 448, various types of authentication information such as fingerprints, a PIN number, vein information and the like are registered. - The
processor 6 constitutes the control part, the operational restriction setting judgment part, the authentication information request part, the information processing part and the like. Theprocessor 6 is comprised of a CPU (Central Processing Unit) or the like, and provided with the memory part for storing data in the process of computing. Thisprocessor 6 executes various types of programs such as the above-describedmanagement program 422, and performs various settings and controls such as phone call function, open/close lock function, its release function, operational restriction setting judgment function, authentication information request function, screen display function, input/output of various data function, address book or phonebook searching function, notepad writing function, or its delete function. That is, among various types of functions of theprocessor 6, the control part provides functions to accept another function calling while operating one function and to release operational restriction based on the judgment of authentication information in the case where the operational restriction has been set to the function being called. More specifically, the control part provides such a function that accepts incoming calls in the case where operational restriction has been set; accepts another function calling during a phone talk; and releases the operational restriction based on authentication information, in the case where the operational restriction has been set to the function being called. - Further, the function as the operational restriction setting judgment part the
processor 6 possesses is a function to judge whether or not operational restriction has been set to another function being called in the case where said another function is called while operating one function. Furthermore, the function as the authentication information request part is a function to make a request to the user for authentication information for releasing the operational restriction in the case where the operational restriction setting judgment part judges that the operational restriction has been set to said another function. Moreover, the function as the control part that is linked with these functions is a function to make a judgment by comparing the authentication information requested from the authentication information request part with the authentication information entered by the user, and that releases the operational restriction based on the judgment result. - The wireless transmission/
reception part 8 performs transmission/reception over wireless signals to and from base stations (not shown) via anantenna 22. This wireless transmission/reception part 8 includes a modem circuit for performing modulation/demodulation as signal processing, and a baseband circuit for performing encryption/decryption and the like. - The open/
close sensor 10 is disposed when the open/close mechanism 24 is provided for the mobileterminal device 2, and detects electrically that the open/close mechanism 24 is brought into an opened state or a closed state. - The
input operation part 12 is used for entering phone numbers, characters, and PIN numbers as a personal identification number; for activating a function; and for operating its release and the like. Theinput operation part 12 includes a task key 122, adecision key 124, dial andcharacter keys 126, a start andcharacter key 128, a power/end key 129, and others. When a PIN number or the like is used as authentication information, theinput operation part 12 constitutes the authentication information input part. - In this
input operation part 12, the task key 122 comprises an operation part used for function calling, and used for entering instructions such as activation of functions. Thedecision key 124 is used for entering a confirmation of instructions for the information or the function displayed on thedisplay part 16 when the function is activated. Dial andcharacter keys 126 are used for dial input, character input, PIN number input as authentication information and others. The start andcharacter key 128 is used for starting a phone call. The power/end key 129 is used for turning the power on and terminating phone calls. - The
fingerprint sensor 14 comprises the authentication information input part, and in this embodiment, detects the fingerprints of users that are one of the authentication information. Thefingerprint sensor 14 may be skipped when fingerprints are not used as authentication information. - The
display part 16 consists of an LCD (Liquid Crystal Display), for example, and displays images such as characters, graphics, and pictures; status indication while one function is operated; and in the case where another function calling is performed while one function is operated, displays information about the function calling or its status indication in progress. - The
microphone 18 converts voice input into electrical signals, and thespeaker 20 converts the electrical signals into voice. Themicrophone 18 and thespeaker 20 are used in both outgoing call mode and incoming call mode; however, in all-lock mode, operational restriction is set thereto. - According to the mobile
terminal device 2 configured as such can operate multiple functions simultaneously as well as put operational restriction selectively on each function depending on its security features. Further, it can accept another function calling while operating one function; accept input of authentication information if operational restriction has been set to said another function; compare the entered authentication information with the registered authentication information; and operate said another function while operating said one function if the entered authentication information is correct. For example, if a situation arises in which phonebook needs to be referenced during incoming calls in the case where operational restriction has been set to the phonebook and receiving incoming calls has been made possible, pressing the task key 122 switches to authentication mode and reference-of the phonebook is allowed if the authentication information is found as identical. In this way, another function can be operated while one function is operated based on the condition that the authentication information is identical, and this can save the operation to switch to another function after having terminated one function, maintain security features, and consequently provide the mobileterminal device 2 of higher convenience. - Next, this mobile
terminal device 2 will be described with reference toFIGS. 2, 3 .FIG. 2 is a front view of the mobileterminal device 2 in an opened state, whereasFIG. 3 is a side view in a closed state. InFIGS. 2, 3 , the same symbols are assigned to parts identical to those ofFIG. 1 . - This mobile
terminal device 2 includes a first and asecond case part case parts close mechanism 24. The open/close sensor 10 is disposed on thecase parts close mechanism 24, and a detection signal for representing an opened or closed state of thecase parts close sensor 10. When thecase parts FIG. 3 ), a locked-up state (operational restriction state) is brought into by the detection signal from the open/close sensor 10. - On the
case part 26,various keys 122 to 129 of theinput operation part 12, thefingerprint sensor 14, themicrophone 18 and others are disposed along with the built-inmemory part 4, theprocessor 6 and others. On thecase part 28, thedisplay part 16 and thespeaker 20 are disposed along with the built-inantenna 22. - According to this mobile
terminal device 2, the above-described operations such as calling another function during a phone talk, authentication operation of its authentication information, and operation of said another function can be performed without any alterations to the key arrangement of the existinginput operation part 12. - Next, the operation of incoming calls and function calling while the open/close lock has been set will be described with reference to
FIG. 4 .FIG. 4 is a flowchart showing the operation of incoming calls and function calling while the open/close lock has been set. This processing is performed when thecase parts - As described above, in this
terminal device 2, the operation of incoming calls and phone talk is possible even if operational restriction has been set to its various types of functions. This is a situation in which the power has been turned on; an incoming call is received while operational restriction has been set; and a ring alert occurs (step Si) while thecase parts FIG. 3 ). When the user opens thecase parts 26, 28 (FIG. 2 ), then a standby screen is activated and displayed on the display part 16 (step S2). With this state, the user starts a phone talk (step S3), and a screen showing that the phone talk is in progress is displayed (step S4). That is, the user can recognize that the phone talk is still in progress. - During this phone talk, for example, pressing the task key 122 (step S5) as a specific key of the
input operation part 12 starts another function calling other than the phone talk function. In order to shift to that function, a judgment is made whether or not the open/close lock (operational restriction) has been set (step S6); if the lock has been set, authentication screen is displayed on the display part 16 (step S7); the user enters authentication information by following the instruction displayed on the authentication screen (step S8); and a judgment is made whether or not the entered authentication information is correct (step S9). In this authentication processing, it is judged whether or not the entered authentication information is identical to the previously registered authentication information by using the previously registered authentication information as a reference. If identical, then the authentication completes; the operational restriction is released; the function is activated (step S10); and the screen showing its operation is displayed (step S11). If the operational restriction has not been set, the procedure moves from step S6 to step S10. - The user can operate this function during phone talk, and when the user finishes operating this function (step S12), a judgment is made whether or not the phone talk is over (step S13). If the phone talk is still taking place, then the procedure moves to step S4 to display the screen showing that the phone talk is in progress; and then returns to the standby screen of step S2 when the phone talk is over.
- According to such processing, the user can receive incoming calls with the mobile
terminal device 2 in an opened state (FIG. 3 ) and, for example, can refer to the phonebook during the phone talk. In addition, when the user finishes the phone talk, the locked state can be recovered by returning the mobileterminal device 2 to a closed state (FIG. 3 ) from an opened state (FIG. 2 ). - Next, the operation of incoming calls and function calling while the open/close lock has been set in such a situation where the case parts are opened will be described with reference to
FIG. 5 .FIG. 5 is a flowchart showing the operation of incoming calls and function calling while the open/close lock has been set. - If incoming calls are received while the
case parts FIG. 2 ), the processing shown as the flowchart inFIG. 5 is executed. That is, when thecase parts - During this phone talk, for example, pressing the task key 122 (step S25) as a specific key of the
input operation part 12 starts another function calling other than the phone talk function as described above. In order to shift to that function, a judgment is made whether or not the open/close lock (operational restriction) has been set (step S26); if the lock has been set, the authentication screen is displayed on the display part 16 (step S27); the user enters authentication information following the instruction displayed on the authentication screen (step S28); and a judgment is made whether or not the entered authentication information is correct (step S29). In this authentication processing, if the entered authentication information is identical to the previously registered authentication information, then the operational restriction is released; the function is activated (step S30) and the screen showing its operation is displayed (step S31) If the operational restriction has not been set, the procedure moves from step S26 to step S30. - The user can operate this function during phone talk, and when the user finishes operating this function (step S32), a judgment is made whether or not the phone talk is over (step S33). If the phone talk is still taking place, then the procedure moves to step S24 to wait for the specific key to be pressed; and returns to the standby screen of step S21 when the phone talk is over.
- This processing is performed when the user receives an incoming call with the standby screen activated (
FIG. 2 ), and can activate another function by releasing its operational restriction during the phone talk. In addition, when the user finishes the phone talk, the locked-up state can be recovered by returning the mobileterminal device 2 to a closed state (FIG. 3 ). - Next, a series of screens from receiving incoming calls to releasing the open/close lock will be described with reference to
FIGS. 6A, 6B , 6C, 6D, 7A, and 7B.FIGS. 6A to 6D are diagrams showing screens of an incoming call while the open/close lock has been set, another function calling, and authentication information input and the like, whereasFIG. 7A is a diagram showing a screen that the open/close lock is released, and 7B is a diagram showing a menu screen after the open/close lock has been released. - If an incoming call is received while the open/close lock has been set, a
screen 50 for indicating the incoming call is displayed on thedisplay part 16 as shown inFIG. 6A . On thisscreen 50, alock icon 52 for indicating that the open/close lock has been set; a message “receiving a call”, the phone number of the caller and others are displayed. - When the user starts the phone talk, a
screen 54 for indicating that the phone talk is in progress is displayed on thedisplay part 16 as shown inFIG. 6B . On thisscreen 54, a message “phone talk is in progress” and the phone number of the caller are displayed. Thisscreen 54 may also display the name of the caller and other information. - During this phone talk, pressing the task key 122 (
FIG. 2 ) shown inFIG. 6C brings up aninput screen 56 for entering authentication information as shown inFIG. 6D . On thisinput screen 56, a text indicating that “fingerprint authentication” is selected; and animage 58 for instructing how to use the fingerprint authentication method as well as a message “Enter your fingerprint or PIN number” is displayed as aguide message 60 for prompting input of authentication information. - When the user enters fingerprints or a PIN number in response to this guide message, then a
screen 62 for indicating a release of the open/close lock is displayed on thedisplay part 16 as shown inFIG. 7A . On thisscreen 62, “Open/close lock has been released” is displayed as amessage 64 for indicating the current state. - Following the
screen 62 for indicating that the open/close lock has been released, amenu selection screen 66 for indicating a menu of functions from which the operational restriction has been released is displayed on thedisplay part 16 as shown inFIG. 7B . On thismenu selection screen 66, various types of functions different from the phone talk function are displayed as selectable menu. For example, such functions as “Multi-access, Mail, Phonebook, List of applications...” are displayed. “Multi-access” indicates that activation and operation of another function that is selected is available while operating one function, for example, while operating the phone talk function. In this situation, for example, putting acursor 68 on the “phonebook” and pressing thedecision key 124 unfolds the phonebook data on thedisplay part 16. In this way, the user can reference the phonebook during the phone talk. If the user selects a different function, then that function is operated. When the user finishes using these functions, thescreen 54 indicating that the phone talk is in progress is displayed as shown inFIG. 6B , and the standby screen is brought back when the user finishes the phone talk. - With such a series of screen and guide information displays, the user can operate another function easily by releasing its lock during the phone talk.
- Next, the operation of function calling while the open/close lock has been set will be described with reference to
FIG. 8 .FIG. 8 is a flowchart showing the operation of function calling while the open/close lock has been set. - When the
case parts lock icon 52 for indicating the open/close lock has been set is displayed if the lock is applied. In this standby state, when the user operates function calling, the function calling is accepted (step S42), followed by a judgment that the open/close lock has been set or not (step S43). - If the open/close lock has been set, then the authentication screen is displayed on the display part 16 (step S44); and the user is prompted with input of authentication information. When the user enters the authentication information by following the guide (step S45); then a judgment is made whether or not the entered authentication information is correct (step S46). If the entered authentication information is identical to the previously registered authentication information, then the open/close lock is released and the selected function is activated (step S47); and the screen showing its operation is displayed (step S48). If the operational restriction has not been set, the procedure moves from step S43 to step S47. If the authentication information is judged as incorrect in step S46, then the standby screen in step S41 is brought back. After the authentication processing has completed successfully and the function has been activated, a judgment is made whether or not the function is finished (step S49), and the standby screen is brought back after the completion of the function (step S41).
- According to this configuration, a certain function can be called from the standby screen, and when the lock has been set to the function, the function can be activated and operated through its authentication processing. As described above, without terminating the operation of the function, the mobile
terminal device 2 can be put into a locked-up state by folding it to a closed state (FIG. 3 ). - Next, the operation of another function calling while one function is operated will be described with reference to
FIG. 9 .FIG. 9 is a flowchart showing the operation of another function calling while one function is operated. - Steps S51 to S58 show the operation of one function, and steps S60 to S66 show the operation of another function while operating said one function. In this operation, operational restriction may have been set to any of the functions in steps S60 to S66. This is a situation in which the operation of another function calling is accepted while operating one function and in which operational restriction is released from said another function in the case if any operational restrictions have been put thereon.
- The standby screen is displayed on the
display part 16 of the mobileterminal device 2 in a standby state (step S51). With this state, when the user executes one function calling (step S52), then a judgment is made whether it has been locked or not (step S53); if it has been locked, then the authentication screen is displayed on the display part 16 (step S54); and the user is prompted with input of authentication information. When the user enters the authentication information by following the guide (step S55); then a judgment is made whether or not the entered authentication information is correct (step S56). If the entered authentication information is identical to the previously registered authentication information, then the lock is released and the selected function is activated (step S57); and the screen showing its operation is displayed (step S58). If the function has not been locked in step S53, the procedure shifts from step S53 to step S57 to activate the function. - If the authentication information is judged as incorrect in step S56, then the standby screen in step S51 is brought back. After the authentication processing has completed successfully and the function has been activated, the
management program 422 monitors whether or not the ongoing function is finished (step S59), and brings back the standby screen at the end of the function (step S51). - By the way, if another function calling occurs while operating one function (step S60), then a judgment is made whether or not the function has been locked (step S61). If the function has been locked, then authentication screen is displayed on the display part 16 (step S62); and the user is prompted with input of authentication information. When the user enters the authentication information by following the guide (step S63); then a judgment is made whether or not the entered authentication information is correct (step S64). If the entered authentication information is identical to the previously registered authentication information, then the lock is released and said another function is activated (step S65); and the screen showing its operation is displayed (step S66). If said another function has not been locked in step S61, the procedure shifts from step S61 to step S65 to activate said another function.
- If the authentication information is judged as incorrect in step S64, then the screen showing the operation of the ongoing function in
step 58 is displayed. After the authentication processing has completed successfully and said another function has been activated, themanagement program 422 monitors whether or not said another function is finished (step S67), and shifts to the screen showing the ongoing operation at the end of said another function (step S58), making it ready for calling other functions. - According to this configuration, another function can be called while the operation of one function continues, and if the lock function has been applied to said another function being called, that is, if operational restriction has been put thereon, then said another function can be activated and operated through input of its authentication information and judgment of its correctness. Since the activation of this latter function is realized by an interrupt-service in the middle of processing the former function, so when the latter function finishes, the procedure returns to the previous function to continue its operation. Furthermore in this embodiment, by putting the mobile
terminal device 2 back into a closed state (FIG. 3 ), the lock function can be applied again. The electronic devices such as the mobileterminal device 2 comprising such features can operate multiple functions simultaneously with no decline in security features and operability. - A second embodiment of the present invention will be described with reference to
FIGS. 10, 11 .FIG. 10 is a block diagram of a mobileterminal device 2 according to a second embodiment.FIG. 11 is a diagram showing a specific configuration example of the mobile terminal device. InFIGS. 10, 11 , the same symbols are assigned to parts identical to those ofFIGS. 1, 2 . - The mobile
terminal device 2 of this embodiment includes alock key 123 in place of the open/close sensor 10 (FIG. 1 ). According to this configuration, pressing thelock key 123 activates the lock function and puts operational restriction. That is, thislock key 123 executes the activation of the lock function in the lock set/release program 428 stored in theprogram storage part 42. Other configurations are the same as those of the mobileterminal device 2 of the first embodiment. - Such a mobile
terminal device 2 is not equipped with the open/close mechanism 24 (FIG. 1 ), and comprised of asingle case part 27. Thelock key 123 is disposed on thiscase part 27. Theinput operation part 12 and thedisplay part 16 and others that are disposed separately on thecase parts single case part 27. Each configuration is the same as those of the mobileterminal device 2 of the first embodiment (FIG. 2 ). - Also in this configuration, the above-described operations shown in
FIGS. 4, 5 , screen displays shown inFIGS. 6A to 7B, and operations shown inFIGS. 8, 9 can be performed. That is, while operational restriction has been set by operating thelock key 123, the processing such as accepting incoming calls and activating one function; calling another function during the incoming calls or while operating said one function; and activating and operating said another function through its authentication processing is enabled, so that there is an advantage that complicated key operations are not required. - In the above-described first embodiment, the mobile
terminal device 2 comprising the fingerprint sensor 14 (FIGS. 1, 2 ) was exemplified. However, as shown inFIG. 12 , the mobileterminal device 2 can be configured without thefingerprint sensor 14, by enabling the release of operational restriction through a secret number such as a PIN number. - In the above-described embodiments, the mobile
terminal device 2 was exemplified as an electronic device; however, as shown inFIG. 13 , the present invention can also be applied to a PC (personal computer) 70. InFIGS. 13 , the same symbols are assigned to parts identical to those ofFIGS. 1, 2 . ThisPC 70 is constructed such that thecase part 26 and thecase part 28 are disposed to be openable/closeable via the open/close mechanism 24, and on thecase part 26, the above-described open/close sensor 10 is disposed. That is, it is also possible to configure thePC 70 to activate its lock mechanism by detecting an open/close state. In addition, in thisPC 70, disposing the task key 122 as a specific key provides, as described above, the capability of calling another function on which operational restriction has been put while one function is operated; enables to activate and then operate said another function after its authentication processing is completed; and can enhance security features for thePC 70 as well. - Further, the present invention can also be applied to a PDA (Personal Digital Assistant) 72 shown in
FIG. 14 . As has been described with reference toFIGS. 10, 11 , the PDA can be configured to include the lock function along with thelock key 123. Such a configuration provides, as described above, the capability of calling another function on which operational restriction has been put while one function is operated; enables to activate and then operate said another function after its authentication processing is completed; and can enhance security features for thePDA 72 as well. - Further, the present invention can also be applied to a
camera 74 shown inFIG. 15 . As has been described with reference toFIGS. 10, 11 , the camera can be configured to include the lock function along with thelock key 123. Such a configuration provides, as described above, the capability of calling another function, for example, edit function on which operational restriction has been put that becomes effective while one function such as photo shooting mode is operated; enables to activate and then operate the edit function after its authentication processing is completed. Thus thecamera 74 can be also provided with enhanced security features against deletion or falsification of its photographed data. - Further, the present invention can be applied to such as a game machine as well. For example, by enabling the game machine to call another game function on which operational restriction has been put while one game function is operated; and to activate and then operate said another game function after its authentication processing is completed, the game machine can be provided with enhanced security features against deletion or falsification of information set to the game.
- In the above-described embodiments, the mobile
terminal device 2, thePC 70, thePDA 72, thecamera 74, and the game machine were exemplified as electronic devices. However, the present invention can also be applied to various types of electronic devices capable of operating multiple functions simultaneously and capable of setting operational restriction for the functions, other than the above-described ones. - In the above-described embodiments, a situation was exemplified in which the mobile
terminal device 2 that has been locked by the open/close lock mechanism could start a phone talk when it receives incoming calls, and could operate another function such as address book reference during a phone talk. However, it is also possible to configure the mobileterminal device 2 in such a way that the mobileterminal device 2 that is playing a game as an example of one function can start a phone talk immediately after it receives incoming calls, or can start a phone talk after it requests authentication information followed by a verification of correctness of the provided authentication information. - In the above-described embodiments, the open/close lock function that was interlocked with the open/close mechanism 24 (first embodiment), and the lock function activated by operating the lock key 123 (second embodiment) were exemplified. However, regarding the electronic devices such as the mobile
terminal device 2 operateing multiple functions simultaneously, it is also possible to configure the devices in such a way that the lock function can be activated not only by the open/close mechanism 24 and thelock key 123, but also by detecting the absence of operations by the user for a certain time period. - A most preferred embodiment and the like of the present invention have been described above. However, the present invention is not limited to the above description; it goes without saying that various modifications and alterations may be made by a person skilled in the art on the basis of the gist of the invention that is described in the claims and disclosed in the detailed description of the invention, and that such modifications and alterations are included in the scope of the present invention.
- The present invention relates to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, and is useful such that it enables to operate another function through authentication information matching; to realize simultaneous operation of multiple functions without degrading usability and security; and to increase level of convenience for electronic devices.
Claims (9)
1. An electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising ‘a control part that accepts said another function calling while operating said one function, and that releases operational restriction based on a judgment of authentication information in the case where the operational restriction has been set to said another function being called.
2. The electronic device of claim 1 , further comprising an authentication information input part in order to input authentication information.
3. The electronic device of claim 1 , wherein the control part further judges whether or not the entered authentication information matches the registered authentication information.
4. The electronic device of claim 1 , further comprising an operation part used for the function calling.
5. The electronic device of claim 1 , wherein the control part further outputs display information prompting for input of authentication information in the case where a function calling is accepted.
6. An operational restriction control method of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising the processing of:
accepting said another function calling while operating said one function;
judging authentication information in the case where operational restriction has been set to said another function being called; and
releasing the operational restriction based on the judgment of the authentication information.
7. The operational restriction control method of an electronic device of claim 6 , further comprising the processing of outputting display information prompting for input of authentication information used as a reference in order to release the operational restriction.
8. An operational restriction control program of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the program to be executed by a computer, comprising the steps of:
accepting said another function calling while operating said one function;
judging authentication information in the case where operational restriction has been set to said another function being called; and
releasing the operational restriction based on the judgment of the authentication information.
9. The operational restriction control program of an electronic device of claim 8 , further comprising the step of outputting display information prompting for input of authentication information used as a reference in order to release the operational restriction.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005119890A JP2006303701A (en) | 2005-04-18 | 2005-04-18 | Electronic equipment, and method and program of controlling operation suppression thereof |
JP2005-119890 | 2005-04-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060234764A1 true US20060234764A1 (en) | 2006-10-19 |
Family
ID=35923803
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/239,401 Abandoned US20060234764A1 (en) | 2005-04-18 | 2005-09-30 | Electronic device, operational restriction control method thereof and operational restriction control program thereof |
Country Status (5)
Country | Link |
---|---|
US (1) | US20060234764A1 (en) |
EP (1) | EP1715663A3 (en) |
JP (1) | JP2006303701A (en) |
KR (1) | KR20060109808A (en) |
CN (1) | CN1855956A (en) |
Cited By (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070273658A1 (en) * | 2006-05-26 | 2007-11-29 | Nokia Corporation | Cursor actuation with fingerprint recognition |
US20080016371A1 (en) * | 2006-07-14 | 2008-01-17 | Arachnoid Biometrics Identification Group Corp. | System and Method for Registering a Fingerprint, for Setting a Login Method of an Application, and for Logining in the Application |
US20080305771A1 (en) * | 2007-06-06 | 2008-12-11 | Nec Corporation | Mobile terminal, and program and method for preventing unauthorized use of mobile terminal |
US20090291711A1 (en) * | 2008-05-22 | 2009-11-26 | Mstar Semiconductor, Inc. | Protection Setting Method and Protection Releasing Method for Portable Device |
US20090311991A1 (en) * | 2008-06-16 | 2009-12-17 | Samsung Electronics Co. Ltd. | Mobile terminal and method for protecting personal information thereof |
US20100103102A1 (en) * | 2008-10-27 | 2010-04-29 | Htc Corporation | Displaying method and display control module |
US20100191953A1 (en) * | 2007-07-12 | 2010-07-29 | Minoru Sugiyama | Electronic apparatus, information output method and program |
JP2014052910A (en) * | 2012-09-07 | 2014-03-20 | Fujitsu Ltd | Operation control program, portable electronic apparatus, and operation control method |
CN104079721A (en) * | 2014-06-26 | 2014-10-01 | 北京百纳威尔科技有限公司 | Terminal contact person security processing method and device |
US20150257004A1 (en) * | 2014-03-07 | 2015-09-10 | Cellco Partnership D/B/A Verizon Wireless | Symbiotic biometric security |
US9191477B2 (en) | 2011-09-27 | 2015-11-17 | Kyocera Corporation | Electronic device |
US9819676B2 (en) | 2012-06-29 | 2017-11-14 | Apple Inc. | Biometric capture for unauthorized user identification |
US9832189B2 (en) | 2012-06-29 | 2017-11-28 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
JP2019075152A (en) * | 2007-09-24 | 2019-05-16 | アップル インコーポレイテッドApple Inc. | Embedded authentication system in electronic device |
US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
US20190370583A1 (en) * | 2017-09-09 | 2019-12-05 | Apple Inc. | Implementation of biometric authentication |
US10510097B2 (en) | 2011-10-19 | 2019-12-17 | Firstface Co., Ltd. | Activating display and performing additional function in mobile terminal with one-time user input |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10735412B2 (en) | 2014-01-31 | 2020-08-04 | Apple Inc. | Use of a biometric image for authorization |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US10803281B2 (en) | 2013-09-09 | 2020-10-13 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11074572B2 (en) | 2016-09-06 | 2021-07-27 | Apple Inc. | User interfaces for stored-value accounts |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11200309B2 (en) | 2011-09-29 | 2021-12-14 | Apple Inc. | Authentication with secondary approver |
US11209961B2 (en) | 2012-05-18 | 2021-12-28 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US20220012351A1 (en) * | 2016-04-29 | 2022-01-13 | Wells Fargo Bank, N.A. | Real-time feature level software security |
US11321731B2 (en) | 2015-06-05 | 2022-05-03 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US11574041B2 (en) | 2016-10-25 | 2023-02-07 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US11676188B2 (en) | 2013-09-09 | 2023-06-13 | Apple Inc. | Methods of authenticating a user |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US11783305B2 (en) | 2015-06-05 | 2023-10-10 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
US11947711B1 (en) * | 2016-04-29 | 2024-04-02 | Wells Fargo Bank, N.A. | Real-time feature level software security |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007010043A1 (en) * | 2007-02-20 | 2008-08-21 | Fujitsu Siemens Computers Gmbh | Pocket personal computer e.g. smartphone, has device lock engaged in energy saving condition, where computer remains in energy saving condition when device lock is activated and input takes place over keyboard or application keys |
JP5359864B2 (en) * | 2007-03-13 | 2013-12-04 | 日本電気株式会社 | Mobile terminal and function control method thereof |
US8045518B2 (en) * | 2007-03-23 | 2011-10-25 | Innovative Sonic Limited | Method of deactivating high-speed downlink operation in CELL—FACH state for a wireless communications system and related apparatus |
JP5335090B2 (en) * | 2009-08-27 | 2013-11-06 | 京セラ株式会社 | Mobile device |
JP5353659B2 (en) * | 2009-11-26 | 2013-11-27 | 日本電気株式会社 | Mobile terminal device and incoming call response method |
US8583097B2 (en) | 2011-03-23 | 2013-11-12 | Blackberry Limited | Method for conference call prompting from a locked device |
EP2503768B1 (en) * | 2011-03-23 | 2018-04-11 | BlackBerry Limited | Conference call prompting by a locked device |
CN102185955A (en) * | 2011-04-29 | 2011-09-14 | 信源通科技(深圳)有限公司 | Mobile terminal with security function and security method thereof |
JP5289510B2 (en) * | 2011-06-06 | 2013-09-11 | 株式会社東芝 | Information processing apparatus and lock setting method |
EP3089064A1 (en) * | 2015-04-08 | 2016-11-02 | LG Electronics Inc. | Mobile terminal and method for controlling the same |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6668322B1 (en) * | 1999-08-05 | 2003-12-23 | Sun Microsystems, Inc. | Access management system and method employing secure credentials |
US20040257196A1 (en) * | 2003-06-20 | 2004-12-23 | Motorola, Inc. | Method and apparatus using biometric sensors for controlling access to a wireless communication device |
US20050197103A1 (en) * | 2004-02-26 | 2005-09-08 | Nec Corporation | Mobile phone with restriction on use thereof and method for restricting use of mobile phone |
US20060075224A1 (en) * | 2004-09-24 | 2006-04-06 | David Tao | System for activating multiple applications for concurrent operation |
US20060160576A1 (en) * | 2003-03-05 | 2006-07-20 | Sanyo Electric Co., Ltd. | Broadcast reception device |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1130934A1 (en) * | 2000-02-29 | 2001-09-05 | Koninklijke Philips Electronics N.V. | Radiotelephone having a keyboard locking function with a password |
JP2002027092A (en) * | 2000-07-13 | 2002-01-25 | Hitachi Kokusai Electric Inc | Portable terminal |
JP2003091509A (en) * | 2001-09-17 | 2003-03-28 | Nec Corp | Personal authentication method for portable communication equipment and program describing the same |
JP4313013B2 (en) * | 2002-09-18 | 2009-08-12 | 富士通株式会社 | Portable terminal device, information processing method thereof, and information processing program thereof |
JP3751927B2 (en) * | 2002-10-11 | 2006-03-08 | Necアクセステクニカ株式会社 | Voice information notification method for mobile phone and mobile phone with voice information notification function using the same |
JP4044562B2 (en) * | 2003-04-15 | 2008-02-06 | 富士通株式会社 | Electronic equipment |
JP4002535B2 (en) | 2003-04-28 | 2007-11-07 | 京セラ株式会社 | Mobile communication terminal |
JP2005057654A (en) * | 2003-08-07 | 2005-03-03 | Sharp Corp | Portable information terminal |
-
2005
- 2005-04-18 JP JP2005119890A patent/JP2006303701A/en active Pending
- 2005-09-26 EP EP05255963A patent/EP1715663A3/en not_active Withdrawn
- 2005-09-30 CN CNA2005101079967A patent/CN1855956A/en active Pending
- 2005-09-30 KR KR1020050091863A patent/KR20060109808A/en not_active IP Right Cessation
- 2005-09-30 US US11/239,401 patent/US20060234764A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6668322B1 (en) * | 1999-08-05 | 2003-12-23 | Sun Microsystems, Inc. | Access management system and method employing secure credentials |
US20060160576A1 (en) * | 2003-03-05 | 2006-07-20 | Sanyo Electric Co., Ltd. | Broadcast reception device |
US20040257196A1 (en) * | 2003-06-20 | 2004-12-23 | Motorola, Inc. | Method and apparatus using biometric sensors for controlling access to a wireless communication device |
US20050197103A1 (en) * | 2004-02-26 | 2005-09-08 | Nec Corporation | Mobile phone with restriction on use thereof and method for restricting use of mobile phone |
US20060075224A1 (en) * | 2004-09-24 | 2006-04-06 | David Tao | System for activating multiple applications for concurrent operation |
Cited By (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070273658A1 (en) * | 2006-05-26 | 2007-11-29 | Nokia Corporation | Cursor actuation with fingerprint recognition |
US20080016371A1 (en) * | 2006-07-14 | 2008-01-17 | Arachnoid Biometrics Identification Group Corp. | System and Method for Registering a Fingerprint, for Setting a Login Method of an Application, and for Logining in the Application |
US20080305771A1 (en) * | 2007-06-06 | 2008-12-11 | Nec Corporation | Mobile terminal, and program and method for preventing unauthorized use of mobile terminal |
US9031533B2 (en) * | 2007-06-06 | 2015-05-12 | Nec Corporation | Mobile terminal, and program and method for preventing unauthorized use of mobile terminal |
US20100191953A1 (en) * | 2007-07-12 | 2010-07-29 | Minoru Sugiyama | Electronic apparatus, information output method and program |
US8219718B2 (en) * | 2007-07-12 | 2012-07-10 | Nec Corporation | Electronic apparatus, information output method and program |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
JP2019075152A (en) * | 2007-09-24 | 2019-05-16 | アップル インコーポレイテッドApple Inc. | Embedded authentication system in electronic device |
US11468155B2 (en) | 2007-09-24 | 2022-10-11 | Apple Inc. | Embedded authentication systems in an electronic device |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US20090291711A1 (en) * | 2008-05-22 | 2009-11-26 | Mstar Semiconductor, Inc. | Protection Setting Method and Protection Releasing Method for Portable Device |
US8600350B2 (en) * | 2008-05-22 | 2013-12-03 | Mstar Semiconductor, Inc. | Protection setting method and protection releasing method for portable device |
US8265596B2 (en) * | 2008-06-16 | 2012-09-11 | Samsung Electronics Co., Ltd. | Mobile terminal and method for protecting personal information thereof |
US20090311991A1 (en) * | 2008-06-16 | 2009-12-17 | Samsung Electronics Co. Ltd. | Mobile terminal and method for protecting personal information thereof |
US20100103102A1 (en) * | 2008-10-27 | 2010-04-29 | Htc Corporation | Displaying method and display control module |
US9191477B2 (en) | 2011-09-27 | 2015-11-17 | Kyocera Corporation | Electronic device |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
US11200309B2 (en) | 2011-09-29 | 2021-12-14 | Apple Inc. | Authentication with secondary approver |
US11551263B2 (en) | 2011-10-19 | 2023-01-10 | Firstface Co., Ltd. | Activating display and performing additional function in mobile terminal with one-time user input |
US10896442B2 (en) | 2011-10-19 | 2021-01-19 | Firstface Co., Ltd. | Activating display and performing additional function in mobile terminal with one-time user input |
US10510097B2 (en) | 2011-10-19 | 2019-12-17 | Firstface Co., Ltd. | Activating display and performing additional function in mobile terminal with one-time user input |
US11209961B2 (en) | 2012-05-18 | 2021-12-28 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9819676B2 (en) | 2012-06-29 | 2017-11-14 | Apple Inc. | Biometric capture for unauthorized user identification |
US9832189B2 (en) | 2012-06-29 | 2017-11-28 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
JP2014052910A (en) * | 2012-09-07 | 2014-03-20 | Fujitsu Ltd | Operation control program, portable electronic apparatus, and operation control method |
US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
US11494046B2 (en) | 2013-09-09 | 2022-11-08 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US11768575B2 (en) | 2013-09-09 | 2023-09-26 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10803281B2 (en) | 2013-09-09 | 2020-10-13 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11287942B2 (en) | 2013-09-09 | 2022-03-29 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces |
US11676188B2 (en) | 2013-09-09 | 2023-06-13 | Apple Inc. | Methods of authenticating a user |
US10735412B2 (en) | 2014-01-31 | 2020-08-04 | Apple Inc. | Use of a biometric image for authorization |
US9503894B2 (en) * | 2014-03-07 | 2016-11-22 | Cellco Partnership | Symbiotic biometric security |
US20150257004A1 (en) * | 2014-03-07 | 2015-09-10 | Cellco Partnership D/B/A Verizon Wireless | Symbiotic biometric security |
US10902424B2 (en) | 2014-05-29 | 2021-01-26 | Apple Inc. | User interface for payments |
US10977651B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | User interface for payments |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
US10796309B2 (en) | 2014-05-29 | 2020-10-06 | Apple Inc. | User interface for payments |
CN104079721A (en) * | 2014-06-26 | 2014-10-01 | 北京百纳威尔科技有限公司 | Terminal contact person security processing method and device |
US11783305B2 (en) | 2015-06-05 | 2023-10-10 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US11321731B2 (en) | 2015-06-05 | 2022-05-03 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US11734708B2 (en) | 2015-06-05 | 2023-08-22 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US20220012351A1 (en) * | 2016-04-29 | 2022-01-13 | Wells Fargo Bank, N.A. | Real-time feature level software security |
US11947710B2 (en) * | 2016-04-29 | 2024-04-02 | Wells Fargo Bank, N.A. | Real-time feature level software security |
US11947711B1 (en) * | 2016-04-29 | 2024-04-02 | Wells Fargo Bank, N.A. | Real-time feature level software security |
US11206309B2 (en) | 2016-05-19 | 2021-12-21 | Apple Inc. | User interface for remote authorization |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11900372B2 (en) | 2016-06-12 | 2024-02-13 | Apple Inc. | User interfaces for transactions |
US11074572B2 (en) | 2016-09-06 | 2021-07-27 | Apple Inc. | User interfaces for stored-value accounts |
US11574041B2 (en) | 2016-10-25 | 2023-02-07 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
US10872256B2 (en) * | 2017-09-09 | 2020-12-22 | Apple Inc. | Implementation of biometric authentication |
US11386189B2 (en) | 2017-09-09 | 2022-07-12 | Apple Inc. | Implementation of biometric authentication |
US20190370583A1 (en) * | 2017-09-09 | 2019-12-05 | Apple Inc. | Implementation of biometric authentication |
US10783227B2 (en) | 2017-09-09 | 2020-09-22 | Apple Inc. | Implementation of biometric authentication |
US11393258B2 (en) | 2017-09-09 | 2022-07-19 | Apple Inc. | Implementation of biometric authentication |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
US11809784B2 (en) | 2018-09-28 | 2023-11-07 | Apple Inc. | Audio assisted enrollment |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11619991B2 (en) | 2018-09-28 | 2023-04-04 | Apple Inc. | Device control using gaze information |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US11688001B2 (en) | 2019-03-24 | 2023-06-27 | Apple Inc. | User interfaces for managing an account |
US11669896B2 (en) | 2019-03-24 | 2023-06-06 | Apple Inc. | User interfaces for managing an account |
US11610259B2 (en) | 2019-03-24 | 2023-03-21 | Apple Inc. | User interfaces for managing an account |
US11328352B2 (en) | 2019-03-24 | 2022-05-10 | Apple Inc. | User interfaces for managing an account |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
Also Published As
Publication number | Publication date |
---|---|
JP2006303701A (en) | 2006-11-02 |
EP1715663A2 (en) | 2006-10-25 |
CN1855956A (en) | 2006-11-01 |
EP1715663A3 (en) | 2008-10-29 |
KR20060109808A (en) | 2006-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20060234764A1 (en) | Electronic device, operational restriction control method thereof and operational restriction control program thereof | |
US7310540B2 (en) | Personal communicator with flip element display | |
JP5213353B2 (en) | COMMUNICATION TERMINAL, COMMUNICATION TERMINAL CONTROL METHOD, COMMUNICATION DEVICE, AND COMMUNICATION DEVICE CONTROL METHOD | |
US8311511B2 (en) | Data privacy on wireless communication terminal | |
WO2007091436A1 (en) | Mobile terminal, control method for mobile terminal, control program for mobile terminal, and recording medium | |
JP3707417B2 (en) | Mobile terminal having dial lock function | |
JP2006115043A (en) | Mobile terminal device and program | |
US8285323B2 (en) | Communication device and method for input interface auto-lock thereof | |
JP2000341392A (en) | Communication terminal | |
KR100650680B1 (en) | Mobile communication terminal having a data detail locking function and controlling method therefore | |
JP2004128780A (en) | Cellular phone having key lock function | |
JP3649908B2 (en) | Dial lock release method in mobile communication terminal | |
JP2006277467A (en) | Personal digital assistant | |
JP2009268034A (en) | Portable terminal device | |
JP2006066975A (en) | Portable communication terminal | |
JP4070221B2 (en) | Mobile communication terminal | |
JP4002535B2 (en) | Mobile communication terminal | |
JP2005347986A (en) | Personal digital assistant device | |
JP2010045454A (en) | Cellular phone | |
JP3927903B2 (en) | Portable information terminal device and control method thereof | |
JP4287385B2 (en) | Communication terminal device and control method thereof | |
KR100446513B1 (en) | Method for realizing memo function in mobile terminal | |
JP2006054581A (en) | Method of controlling keylock, electronic apparatus and computer program | |
KR100808413B1 (en) | Character input method for mobile communication device | |
JP4458365B2 (en) | Communication terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GAMO, TATSUYA;TANOUE, TATSUYA;KIKUCHI, YOSHIAKI;AND OTHERS;REEL/FRAME:017061/0171;SIGNING DATES FROM 20050907 TO 20050908 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |